首页> 外文会议>2011 Third World Congress on Nature and Biologically Inspired Computing >Known-plaintext attack of DES-16 using Particle Swarm Optimization
【24h】

Known-plaintext attack of DES-16 using Particle Swarm Optimization

机译:使用粒子群算法的DES-16已知明文攻击

获取原文

摘要

Discovering the root key bits in the cryptanalysis of 16-rounded Data Encryption Standard (DES-160 is considered to be a hard problem. In this paper we present an approach for cryptanalysis of DES-16 based on Particle Swarm Optimization (PSO) using Known-plaintext attack and some equations that deduced from the relationship between sub-key differences and root key information. In Known-plaintext attack the cryptanalyst possesses one or more plaintext/cipher text pairs formed with the secret key and attempts to deduce the root key that used to produce this cipher text. In our approach, PSO is used as optimization technique to collect the optimal effective plaintexts from a plaintext search space according to the proposed fitness function then the set of collected plaintexts and the corresponding cipher texts used to extract the best eight sub-key differences from which most bits of the root key are discovered.
机译:在16位四舍五入数据加密标准(DES-160)的密码分析中发现根密钥位是一个困难的问题。在本文中,我们提出一种基于粒子群优化(PSO)的DES-16密码分析方法,该方法使用已知的-明文攻击和由子密钥差异和根密钥信息之间的关系推导的一些方程式。在已知明文攻击中,密码分析者拥有一个或多个由秘密密钥形成的明文/密文对,并试图推导该密钥在我们的方法中,PSO被用作优化技术,根据拟议的适应度函数从明文搜索空间中收集最优有效明文,然后将所收集的明文集和相应的密文用于提取最佳密文。八个子密钥差异,从中发现根密钥的大多数位。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号